We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability was found in Nababur Simple-User-Management-System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /register.php. The manipulation of the argument name/username leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way.
Eine problematische Schwachstelle wurde in Nababur Simple-User-Management-System 1.0 ausgemacht. Betroffen davon ist ein unbekannter Prozess der Datei /register.php. Mittels dem Manipulieren des Arguments name/username mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
2025-04-09: | VulDB entry created |
2025-04-10: | Advisory disclosed |
2025-04-10: | VulDB entry last update |
Maloy Roy Orko
MaloyRoyOrko (VulDB User)
vuldb.com/?id.304298 (VDB-304298 | Nababur Simple-User-Management-System register.php cross site scripting)
vuldb.com/?ctiid.304298 (VDB-304298 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.545504 (Submit #545504 | Nababur Simple-User-Management-System 1.0 Cross Site Scripting)
www.websecurityinsights.my.id/...ement-system-v-10-name.html
Support options